Author of the publication

Amplified Boomerang Attack against Reduced-Round SHACAL.

, , , , , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 243-253. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Services-Oriented Computing in a Ubiquitous Computing Platform., , , and . ICSOC, volume 4294 of Lecture Notes in Computer Science, page 601-612. Springer, (2006)A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model., , , , , and . IACR Cryptology ePrint Archive, (2004)New Parallel Domain Extenders for UOWHF., , , , and . ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, page 208-227. Springer, (2003)Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA., , , , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 49-60. Springer, (2002)Differential Cryptanalysis of TEA and XTEA., , , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 402-417. Springer, (2003)Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA., , , , , and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 328-342. Springer, (2004)An Event Detection Service for Spatio-temporal Applications., , , , and . W2GIS, volume 4295 of Lecture Notes in Computer Science, page 22-30. Springer, (2006)Amplified Boomerang Attack against Reduced-Round SHACAL., , , , , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 243-253. Springer, (2002)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , and . J. Cryptology, 19 (4): 441-462 (2006)Construction of UOWHF: Two New Parallel Methods., , , , and . IEICE Transactions, 88-A (1): 49-58 (2005)